scholarly journals Open Problems Related to Algebraic Attacks on Stream Ciphers

Author(s):  
Anne Canteaut
2021 ◽  
Author(s):  
Orhun Kara

Tradeoff attacks on symmetric ciphers can be considered as the generalization of the exhaustive search. Their main objective is reducing the time complexity by exploiting the memory after preparing very large tables at a cost of exhaustively searching all the space during the precomputation phase. It is possible to utilize data (plaintext/ciphertext pairs) in some cases like the internal state recovery attacks for stream ciphers to speed up further both online and offline phases. However, how to take advantage of data in a tradeoff attack against block ciphers for single key recovery cases is still unknown. We briefly assess the state of art of tradeoff attacks on symmetric ciphers, introduce some open problems and discuss the security criterion on state sizes. We discuss the strict lower bound for the internal state size of keystream generators and propose more practical and fair bound along with our reasoning. The adoption of our new criterion can break a fresh ground in boosting the security analysis of small keystream generators and in designing ultra-lightweight stream ciphers with short internal states for their usage in specially low source devices such as IoT devices, wireless sensors or RFID tags.


2014 ◽  
Vol 25 (06) ◽  
pp. 763-780 ◽  
Author(s):  
DENG TANG ◽  
CLAUDE CARLET ◽  
XIAOHU TANG

Recently, Tang, Carlet and Tang presented a combinatorial conjecture about binary strings, allowing proving that all balanced functions in some infinite class they introduced have optimal algebraic immunity. Later, Cohen and Flori completely proved that the conjecture is true. These functions have good (provable or at least observable) cryptographic properties but they are not 1-resilient, which represents a drawback for their use as filter functions in stream ciphers. We propose a construction of an infinite class of 1-resilient Boolean functions with optimal algebraic immunity by modifying the functions in this class. The constructed functions have optimal algebraic degree, that is, meet the Siegenthaler bound, and high nonlinearity. We prove a lower bound on their nonlinearity, but as for the Carlet-Feng functions and for the functions mentioned above, this bound is not enough for ensuring a nonlinearity sufficient for allowing resistance to the fast correlation attack. Nevertheless, as for previously found functions with the same features, there is a gap between the bound that we can prove and the actual values computed for small numbers of variables. Our computations show that the functions in this class have very good nonlinearity and also good immunity to fast algebraic attacks. This is the first time that an infinite class of functions gathers all of the main criteria allowing these functions to be used as filters in stream ciphers.


2012 ◽  
Vol 546-547 ◽  
pp. 387-392
Author(s):  
Xiao Wen Xiong ◽  
Ai Guo Wei ◽  
Kai Yin

To resist algebraic attacks, a high algebraic immunity is now an important criteria for Boolean functions used in stream ciphers. In recent years, several constructions of Boolean functions with maximum algebraic immunity (MAI) have been investigated. In this survey paper, we review the recent constructions of Boolean functions with MAI, and classify those into several different classes by the construction idea. Further, we also present some results and developments of these methods, including some results of the authors.


Sign in / Sign up

Export Citation Format

Share Document